In this chapter, we will cover the following:
- Introducing compliance scans
- Selecting a compliance scan policy
- Introducing configuration audits
- Performing an operating system audit
- Performing a database audit
- Performing a web application scan
In this chapter, we will cover the following: